Detecting Kubernetes attacks with Wazuh

Detecting Kubernetes attacks with Wazuh

Post icon
/ Engineering
By

Kubernetes is an open source container orchestration platform that manages applications through a centralized API-driven control plane. Most operations in a Kubernetes cluster are performed via the Kubernetes API and are typically governed by RBAC or other authorization mechanisms. Misconfigured permissions or exposed credentials can allow attackers to interact directly with the Kubernetes API server. […]

Read more
Detecting Kubernetes misconfigurations with KubeLinter and Wazuh

Detecting Kubernetes misconfigurations with KubeLinter and Wazuh

Post icon
/ Engineering
By

Kubernetes misconfigurations introduce security risks in containerized environments. Containers running in privileged mode, workloads without CPU or memory limits, and workloads that run as root are common mistakes that can lead to privilege escalation, node compromise, or denial-of-service conditions. These issues are often introduced during development and remain undetected until deployment, making early detection important. […]

Read more
Detecting and responding to BQTLock ransomware with Wazuh

Detecting and responding to BQTLock ransomware with Wazuh

Post icon
/ Engineering
By

BQTLock is a .NET-based ransomware that targets Windows environments and employs a hybrid encryption approach combining AES-256 and RSA-4096, marking encrypted files with .bqtlock extension. It operates under a Ransomware‑as‑a‑Service (RaaS) model, which lowers the barrier to entry for attackers and accelerates its spread across industries. BQTLock operators typically favor targeted intrusions over random infections, […]

Read more
Automating Linux endpoint hardening with Wazuh

Automating Linux endpoint hardening with Wazuh

Post icon
/ Engineering
By

Endpoint hardening is a continuous process for securing modern IT environments against vulnerabilities and misconfigurations. It reduces the attack surface of endpoints and strengthens defenses against cyber threats by enforcing standardized security configurations. Organizations typically rely on established guidelines and frameworks, such as the Center for Internet Security (CIS) Benchmarks and NIST, for hardening. These […]

Read more
Detecting phishing attacks with Wazuh and Shuffle

Detecting phishing attacks with Wazuh and Shuffle

Post icon
/ Engineering
By

Phishing remains one of the most common social engineering attack techniques, often serving as the initial foothold for ransomware or data exfiltration. Threat actors exploit human trust through deceptive emails to bypass traditional perimeter defences and harvest sensitive data or deliver malicious payloads. As a result, organizations require mechanisms to detect and automatically respond to […]

Read more
Monitoring HashiCorp Vault activities with Wazuh

Monitoring HashiCorp Vault activities with Wazuh

Post icon
/ Engineering
By

Managing secrets in a distributed environment remains a significant challenge for many organizations. HashiCorp Vault (Vault) serves as a centralized system for storing and managing sensitive data such as API keys, tokens, passwords, and certificates. While centralization simplifies administration and access control, misconfigurations or unauthorized access can quickly lead to compromise and data loss. Therefore, […]

Read more
Enriching Wazuh vulnerability detection with Google Gemini integration

Enriching Wazuh vulnerability detection with Google Gemini integration

Post icon
/ Engineering
By

Organizations constantly struggle with vulnerabilities affecting operating systems, applications, and third-party software. These weaknesses expand the attack surface and can be exploited by attackers to compromise the confidentiality, integrity, or availability of systems. Wazuh offers vulnerability detection capability that identifies vulnerabilities in systems and software. However, security analysts must also determine a vulnerability’s exploitability, potential […]

Read more
Detecting and responding to GreenBlood ransomware with Wazuh

Detecting and responding to GreenBlood ransomware with Wazuh

Post icon
/ Engineering
By

GreenBlood ransomware is a Go-based ransomware family that has recently emerged in the threat landscape, targeting Windows environments while employing a double-extortion model. The malware is engineered for high-speed execution and parallel file encryption, leveraging the performance and portability benefits of a compiled, statically linked language. This design allows GreenBlood to rapidly impact infected systems […]

Read more
Detecting DNS tunneling attacks with Wazuh

Detecting DNS tunneling attacks with Wazuh

Post icon
/ Engineering
By

DNS tunneling allows attackers to hide malicious data and commands within legitimate Domain Name System (DNS) traffic, bypassing firewalls and security controls. Attackers exploit the fact that DNS traffic is often permitted on networks without deep inspection to encode sensitive data and commands into DNS queries and responses. This creates a covert communication channel between […]

Read more
Detecting and responding to Salat stealer with Wazuh

Detecting and responding to Salat stealer with Wazuh

Post icon
/ Engineering
By

Salat stealer is a rapidly emerging Go-based information stealer offered under a Malware-as-a-Service (MaaS) model, enabling widespread access to the malware for threat actors. The malware leverages dedicated command and control (C2) infrastructure to manage infected endpoints and exfiltrate stolen data at scale. It primarily targets Windows endpoints to collect browser credentials, Telegram sessions, and […]

Read more
Automating Windows endpoint hardening with Wazuh 

Automating Windows endpoint hardening with Wazuh 

Post icon
/ Engineering
By

Endpoint hardening is a continuous process for securing modern IT environments against vulnerabilities and misconfigurations. It reduces the attack surface of endpoints and strengthens defenses against cyber threats by enforcing standardized security configurations. Organizations typically rely on established guidelines such as the Center for Internet Security (CIS) Benchmarks and frameworks like NIST, which provide best […]

Read more
Keep up to date
with our digest of articles